Disk encryption

Private Disk

Private Disk is a disk encryption application for the Microsoft Windows operating system, developed by Dekart SRL. It works by creating a virtual drive, the contents of which is encrypted on-the-fly; other software can use the drive as if it were a usual one. One of Private Disk's key selling points is in its ease of use, which is achieved by hiding complexity from the end user (e.g. data wiping is applied transparently when an encrypted image is deleted.) This simplicity does however reduce its flexibility in some respects (e.g. it only allows the use of AES-256 encryption.) Although Private Disk uses a NIST certified implementation of the AES and SHA-256/384/512 algorithms, this certification is restricted to a single component of Private Disk; the encryption/hash library used and not to Private Disk as a complete system. (Wikipedia).

Private Disk
Video thumbnail

How to Erase Private Data From Old Drives

PC World explains how to completely erase sensitive data from old drives before recycling or discarding them. Visit www.pcworld.com/videos for more news, reviews and how-to's.

From playlist awareness

Video thumbnail

Understanding Private Browsing

In this video, you’ll learn tips for browsing the web privately. Visit https://edu.gcfglobal.org/en/techsavvy/browsing-privately/1/ to learn even more. We hope you enjoy!

From playlist Internet Tips

Video thumbnail

Dann

Absolutely private.

From playlist Crypto

Video thumbnail

How to Use a USB Drive

A USB drive is a small, removable hard drive that plugs into a USB port on your computer. To learn more about USB Drives visit: https://edu.gcfglobal.org/en/computerbasics/bringing-your-files-with-you/1/ We hope you enjoy!

From playlist Computer Basics

Video thumbnail

The truth about Virtual Private Networks - Should you use a VPN?

Most VPN providers will tell you their virtual private network will make you anonymous. But anonymous VPNs don't exist. Should you use a VPN if you expect privacy and anonymity on the web? How to use a VPN if you want to protect your online privacy? Let's find out. Bitcoin: 1C7UkndgpQqjT

From playlist Decrypted Lies

Video thumbnail

Google Drive

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist Google Drive

Video thumbnail

What is a Virtual Private Network | How VPN works and why VPN is not all you need for privacy

What is a Virtual Private Network? And why using a VPN is not enough to protect your online privacy? There is also a way to be completely anonymous on the web. If that's something you're into, watch this tutorial: https://www.youtube.com/watch?v=_393maHbHWc I made this channel because I

From playlist The state of surveillance

Video thumbnail

Computer Basics: What Is the Cloud?

When you use the cloud, it’s kind of like having an extra hard drive that you can access any time you're connected to the internet. In this video, we’ll show you different ways you can use the cloud and talk about the advantages of backing up your data in the cloud. 0:00 Intro: Protectin

From playlist Starting out with Technology

Video thumbnail

Computer Basics: What Is a Computer?

Computers are all around us, and they play an important role in our lives. But what exactly is a computer? We're going to answer that question and give you an overview of some of the different types of computers you might use. 0:00 Intro 0:22 Ones and zeros 0:39 Hardware and software 1:0

From playlist Starting out with Technology

Video thumbnail

Azure Interview Questions & Answers | Azure QnA | Azure Training | Edureka | Azure Rewind - 3

🔥Azure Certification: https://www.edureka.co/microsoft-certified-azure-solution-architect-certification-training This Edureka Azure Tutorial will give you a gist of the kind of questions that you may face in your interviews on Microsoft Azure. The concepts explained here are essential for

From playlist Edureka Live Classes 2020

Video thumbnail

Azure Interview Questions And Answers | Azure Tutorial For Beginners | Azure Training | Edureka

( Azure Training - https://www.edureka.co/microsoft-certified-azure-solution-architect-certification-training ) In this Azure Interview Questions and Answers tutorial, you shall get a mock on the kind of questions which you may face in your interviews on Microsoft Azure, the concepts expla

From playlist Microsoft Azure Training Videos

Video thumbnail

OpenStack Cloud Tutorial | What is OpenStack | OpenStack Tutorial | OpenStack Training | Edureka

This Edureka OpenStack Cloud tutorial explains how to setup your own OpenStack Cloud infrastructure and also tells you the different OpenStack Cloud deployment models. It also focuses on how to setup different types of cloud infrastructure according to your needs like storage focused, netw

From playlist Openstack Tutorial Videos

Video thumbnail

OpenStack Tutorial – Operate Your Own Private Cloud (Full Course)

Learn how to use OpenStack and manage your own private cloud. 🔗 Start working with OpenStack using OpenMetal here: https://openmetal.io/cloud-trial-youtube-exclusive/ OpenStack is an open source software that provides cloud infrastructure for virtual machines, bare metal, and containers.

From playlist DevOps Courses

Video thumbnail

DEFCON 19: Hacking .Net Applications: The Black Arts

Speaker: Jon McCoy DigitalbodyGuard This presentation will cover the Black Arts of making Cracks, KeyGens, Malware, and more. The information in this presentation will allow a .NET programmer to do unspeakable things .NET applications. I will cover the life cycle of developing such attack

From playlist DEFCON 19

Video thumbnail

CERIAS Security: Security in a Changing World 4/6

Clip 4/6 Speaker: Eric Cole · Lockheed Martin While the world is constantly changing, the core principles of security have not changed that much, yet organizations are stilling be compromised. This talk will look at some of the problems in cyber space and some unique solutions for securi

From playlist The CERIAS Security Seminars 2008

Video thumbnail

23C3: Unlocking FileVault

Speakers: Ralf-Philipp Weinmann, Jacob Appelbaum An analysis of Apple's encrypted disk storage system Analysis of the MacOS X storage encryption technology FileVault. Having fun by reverse-engineering private Frameworks under MacOS X. We present an analysis of Apple's proprietary di

From playlist 23C3: Who can you trust

Video thumbnail

Parallelism in the Enterprise Private Cloud

To learn more about Wolfram Technology Conference, please visit: https://www.wolfram.com/events/technology-conference/ Speaker: Roman E Maeder Wolfram developers and colleagues discussed the latest in innovative technologies for cloud computing, interactive deployment, mobile devices, a

From playlist Wolfram Technology Conference 2017

Video thumbnail

What Is GCP? | Introduction To Google Cloud Platform | GCP Tutorial For Beginners | Simplilearn

🔥Post Graduate Program In Cloud Computing: https://www.simplilearn.com/pgp-cloud-computing-certification-training-course?utm_campaign=WhatIsGCP-Vm5kSqC30BQ&utm_medium=DescriptionFF&utm_source=youtube 🔥 Caltech Cloud Computing Bootcamp (US Only): https://www.simplilearn.com/cloud-computi

From playlist Cloud Computing Tutorial For Beginners 🔥[2023 Updated]

Video thumbnail

Anti-destruction device for laptop

The Lenovo Tapes | Anti-destruction device for laptop

From playlist Lenovo: For Those Who Do.

Video thumbnail

What is Snowflake Database | Snowflake Tutorial | Snowflake Architecture | Edureka

🔥Edureka Snowflake Certification Training (Use Code: YOUTUBE20): https://www.edureka.co/snowflake-certification-training This Edureka video on 'What is Snowflake' will give you an overview of Snowflake data warehouse software as a service as well the key features & architecture of Snowfla

From playlist Snowflake Tutorial for Beginners | Snowflake Training | Edureka

Related pages

Disk encryption | SHA-2 | Disk encryption software | Comparison of disk encryption software | Advanced Encryption Standard